1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
podryga [215]
3 years ago
12

Specialized high-capacity second storage devices designed to meet organizational demands

Computers and Technology
2 answers:
zzz [600]3 years ago
5 0

Answer:

CD devices

Explanation:

xxTIMURxx [149]3 years ago
3 0

Answer:

Mass storage devices

Explanation:

I don't think I can really explain it, that is just the definition of it.

Elimination:

CD and flash drives aren't high-capacity

Platters aren't really storage devices, they are a part of hard drives

You might be interested in
When reading words using a Scanner object's next method, _________. a. any characters at the beginning of the input that are con
zavuch27 [327]

Answer:

The answer is "Option d"

Explanation:

The scanner method is the full token of the process, that finds and returns. It is token, which is followed by both the inputs meeting and the guideline template. This method can block, even though the former instance of hasNext() is true while waiting for input, and wrong choices can be described as follows:

  • In option a, It is incorrect because the character at the beginning can't be considered.
  • In option b, It is wrong because the characters are known as the word in which blank space not a part of the word.
  • In option c, It is wrong because in this input before the call is not the method.
3 0
3 years ago
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?]
MrRa [10]

Answer:

The correct answer to the following question will be "Checksum".

Explanation:

A variable that reflects the amount of several bits in a transmitted packet and is used by practitioners of IT to spot heavy-level anomalies in the transmission of data, known as Checksum.

  • After executing a cryptographic hashing algorithm each piece of information or a document could be allocated a value of checksum before delivery.
  • We are relevant because we are using them to verify the authenticity of the documents.

So, it's the right answer.

3 0
3 years ago
You do not need to use any functions beyond the main function in this problem. Initialize an array of int with the values: 4, 6,
zheka24 [161]

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

   

    int[] arr = {4, 6, 9, 12};

    int sum = 0;

   

    for(int i=0; i<arr.length; i++){

        sum += arr[i];

    }

   

    for(int i=0; i<arr.length; i++){

        System.out.print(arr[i] + " ");

    }

    System.out.println("");

 System.out.println("The sum of the numbers: " + sum);

}

}

Explanation:

* The code is written in Java.

- Initialize the array with the given numbers

- Initialize the <em>sum</em> variable as zero

- Calculate the sum in the first for loop

- Print the numbers in the second for loop

- Print the <em>sum</em>

4 0
3 years ago
The ____ method returns an integer that represents the location of the substring within the string.
enot [183]

Insert Method

it is used to returns an integer that speaks to the area of the substring inside the string.

5 0
3 years ago
If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
Deffense [45]
A writer maybe, because you can work by yourself, even at home.
6 0
3 years ago
Read 2 more answers
Other questions:
  • 2. Write the binary representation of number 1037.379 in IEEE 754 standard in single precision. Express the result in binary, oc
    7·1 answer
  • Which type of system must you connect to and use to make changes to Active Directory?
    15·1 answer
  • Write a program that asks the user to input four numbers (one at a time). After the four numbers have been supplied, it should t
    6·1 answer
  • ___ is a career discipline focusing on helping companies use computer technology effectively.
    12·1 answer
  • Syntax errors ________. a. result from an attempt to perform an operation that cannot executeb. are errors such as misspelled ke
    14·1 answer
  • In general, smartphones do NOT hold as much personal information as tablets.
    11·1 answer
  • EASY POINTS what favorate food<br> so easy
    7·2 answers
  • What can provides access to the only menu in office 2007​
    13·1 answer
  • E Highlight
    6·1 answer
  • During system testing, developers test the program in an environment that is very similar to how the program will eventually be
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!